List of Safety features products
- classification:Safety features
451~495 item / All 1121 items
An intelligent terminal that supports a variety of authentication methods, from mobile access cards to RFID cards, QR codes, and barcodes.
- Entrance/exit management and personal identification system
- Other security systems
- Entrance and exit control system
In stock! The perfect product for you looking for a card reader due to the semiconductor shortage! OSDP compatible!
- Entrance and exit control system
- Entrance/exit management and personal identification system
- RFID/IC tags
Equipped with an NPU, it achieves high-precision and high-speed facial recognition. Personal information is also strictly protected. Demo kits are available for loan.
- Entrance and exit control system
Easy and speedy alcohol check with 'AIZE Breath'
- Other office supplies
- Entrance and exit control system
Streamline operations through cloud management and complete entry and exit management in one stop! Customization options such as feature expansions are also available.
- Entrance and exit control system
Achieving cost reduction for management companies and ensuring safety and convenience for residents in two modes!
- Entrance and exit control system
- Security locks (windows, front doors, etc.)
Leave everything related to your office to us.
- Office furniture
- Entrance and exit control system
- Other office supplies
Just by connecting it to a USB, it analyzes your PC usage history and presents it in an easy-to-read report!
- Security Assessment
- Other Software
AI will effectively guard employees and customer members from internal infection risks.
- Other office supplies
- Entrance and exit control system
A completely new start to store management in an era of crisis.
- Store Analysis System
- Entrance and exit control system
No construction needed! No monthly usage fee! No need to drill holes in the door! Easily manage entry history with the app!
- Entrance and exit control system
Maintaining SPF and DKIM results even after forwarding! We introduce situations where ARC is helpful in our blog.
- Security Assessment
Load balancing through zone transfer! Introducing its importance, structure, procedures, and more in a blog.
- Security Assessment
Phishing targeting specific individuals or organizations! We introduce what is necessary to protect yourself in our blog.
- Security Assessment
A very important factor in preventing email spoofing and impersonation! Introduction to a blog article.
- Security Assessment
DMARC is a key measure against spoofed emails! We will introduce how to identify them in our blog.
- Security Assessment
Answering various questions such as what caller ID spoofing is! Introduction to the blog.
- Security Assessment
Ensure email authentication and protect against external threats! Let's analyze DKIM manually or automatically.
- Security Assessment
An attack that rewrites routes at the DNS level! Knowing how to prevent it is even more important.
- Security Assessment
Targeting the weak security "trash can"! Introducing the mechanisms and benefits in a blog.
- Security Assessment
Mapping a domain to IPv6! An introduction to why it is important and how to add it.
- Security Assessment
Display name impersonation spreading through phishing scams! We introduce the reasons and more in our blog.
- Security Assessment
How to prevent phone number spoofing? Here are some tips for preventing phone number spoofing.
- Security Assessment
Linking domain names and IP addresses! Introducing why it's necessary and how to manage it.
- Security Assessment
A very inconvenient situation for both website visitors and owners! Introduction to the blog.
- Security Assessment
Introducing a perfect article for those who want to know what ping spoofing is.
- Security Assessment
Solved with a few simple steps! Introduction to troubleshooting and more on the blog.
- Security Assessment
Five Tools You Should Set Up to Protect Email Security! Introduction to the Blog
- Security Assessment
Let's implement a security model of 'Trust but Verify'! Introduction to the blog.
- Security Assessment
Reasons for IP spoofing and countermeasures! Information on spoofing countermeasures introduced in the blog.
- Security Assessment
What is the "Include" mechanism? An explanation of how to optimize it according to needs.
- Security Assessment
We capture and detect the license plates of moving vehicles from network camera footage!
- Vehicle Management System
- Entrance and exit control system
- Security cameras and surveillance systems
You can efficiently address software vulnerabilities in a one-stop manner.
- Security Assessment
"Unbreakable," "Unremovable," "Automatically Restoring" Security Solution
- Security Assessment
Important for protecting companies from the threat of cybercrime! Here are some tips for safety.
- Security Assessment
Achieve a secure business mailing system! Build email security and gain trust.
- Security Assessment
Prevent with PowerDMARC! Spoofing attacks are a serious threat to you and your company.
- Security Assessment
Achieve smooth entry and exit procedures for vehicles and the digitization of records using color codes!
- Entrance and exit control system
- Other security systems
Visualize and analyze cyber threats with 100% full packet capture.
- Security Assessment
Detects enhanced threats and abnormal signs in real-time.
- Security Assessment
By integrating a virtual security door and authentication terminal with a 3D image sensor, it accurately detects difficult-to-prevent tailgating and prevents unauthorized entry.
- Entrance and exit control system
- Entrance/exit management and personal identification system
- Security cameras and surveillance systems
Transform that "anxiety" into "peace of mind."
- Security Assessment
- others
Diagnosis can be performed at a fixed rate, regardless of the system scale or the number of screens on the site.
- Security Assessment
- others